Monitoring Performance over ISP Links in Route Control System

Size: px
Start display at page:

Download "Monitoring Performance over ISP Links in Route Control System"

Transcription

1 IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: , p- ISSN: Volume 16, Issue 2, Ver. III (Mar-Apr. 2014), PP Monitoring Performance over ISP Links in Route Control System E.Revathi 1,C.Darwin 2,G.Vivitha 3 1 (Assistant Professor, Department of Computer Science and Engineering) 3 (PG Scholar, Department of Computer Science and Engineering) 1,3 (P.S.R.Rengasamy College of Engineering for Women, Sivakasi, Tamil Nadu, India) 2 (Assistant Lecturer in Information System Networking Engineering, St.Joseph university, Tanzania) Abstract: Multihoming has been employed by end networks to ensure reliability of internet access. This paper makes two important contributions. First, we present a study of the potential improvements in Internet roundtrip times (RTTs) and transfer speeds from employing Multihoming route control. Second, focusing on large enterprises, we propose and evaluate a wide-range of route control mechanisms and evaluate their design trade-offs. The main objective of the project is to implement the Multihoming technique on Route performance benefit using ISP to avoid Congestion. It does not require any modification to Internet routing protocols, and relies solely on end network decisions. We address a number of practical issues such as the usefulness of past history to guide the choice of the best ISP link, the impact of sampling frequency on measurement accuracy, and the overhead of managing performance information for a large number of destinations. Keywords: Multihoming, Reliability,Round Trip Time, Internet Service Provider, Border Gateway Protocol. I. Introduction MULTIHOMING to multiple Internet Service Providers (ISPs) has traditionally been employed by end-networks to ensure reliability of Internet access. However, over the past few years, multihoming has been increasingly leveraged for improving wide-area network performance, lowering bandwidth costs, and optimizing the way in which upstream links are used A number of products provide these route control capabilities to large enterprise customers which have their own public AS number and advertise their IP address prefixes to upstream ISPs using BGP [1]. Recognizing that not all enterprises are large enough to warrant BGP peering with ISPs, another class of products extends these advantages to smaller multihomed organizations which do not use BGP[2]. All of these products use a variety of mechanisms and policies for route control but aside from marketing statements, little is known about their quantitative benefits. We present an in-depth study of the performance benefits of multihoming route control products. Specifically, we seek to address the following two questions: 1) What tangible improvements in Internet performance (e.g., RTTs, throughput) can multihomed end networks expect from route control products? 2) What practical mechanisms must route control products employ to extract the benefits in real deployments? Note that multihoming route control does not require any modification to Internet routing protocols, and relies solely on end network decisions. Therefore, if our research shows that route control can offer tangible performance improvements in practice; this will imply that good performance can still be extracted from the network by making clever use of available Internet routes. On the other hand, if the improvement is insignificant, this may indicate that there is something fundamentally wrong with routing in the Internet and, to support good performance in the future Internet, we may need to replace the Internet routing protocol suite altogether. To answer the first question, we analyze active probe data collected over the servers in the Akamai content distribution network (CDN) infrastructure[3]. We then compute the potential performance improvements from choosing ISPs from several available options. In general, we use the term k-multihoming to refer to the setting in which the subscriber network employs ISPs and controls how traffic is sent or received along the ISP links (at the granularity of individual connections). To compute the potential benefits of multihoming, we assume that the multihomed end network has perfect information of the performance of the ISPs at all time instances, and can change the way traffic is routed arbitrarily often.our analysis of multihoming shows that RTT performance can potentially improve by up to 25% when an end-network connects to two wellchosen ISPs. Similarly, we observe 20% higher transfers speeds from multihoming to two or three ISPs. By studying the composition of the best set of ISPs to 87 Page

2 multihome to, we make observations on how an end network must select its ISP to obtain the maximum possible performance benefits. The second question asks if, and how, the above potential benefits can be realized in practical multihoming scenarios. To this end, we explore several design alternatives for extracting performance benefits from multihoming in practice. Our focus is on enterprise networks with multiple ISP connections. We primarily consider mechanisms used for inbound route control, since enterprises are mainly interested in optimizing network performance for their own clients who download content from the Internet (i.e., sink data)[4].however, our mechanisms can also be extended to multihomed content provider networks which source more data than they sink. II. Objective The aim of the project is to implement the Multihoming technique on Route performance benefit using ISP to avoid Congestion. To quantify the performance improvements from route control and evaluate practical mechanisms and policies for realizing the performance benefits in practice. 1.1 Scope Of The Project The central theme of our approach is to improve Round Trip Time(RTT) and transfer speeds from employing multihoming route control. Our analysis shows that multihoming to three or more ISPs and cleverly scheduling traffic across the ISPs can improve Internet RTTs and throughputs by up to 25% and 20%, respectively. Focusing on large enterprise to evaluate wide range of route control mechanisms. We show that both passive and active measurement-based techniques are equally effective and could improve the Web response times of enterprise networks by up to 25% on average, compared to using a single ISP. III. System Study 1 Existing System We present a study of the potential improvements in Internet round-trip times (RTTs) and transfer speeds from employing multihoming route control. However, over the past few years, multihoming has been increasingly leveraged for improving wide-area network performance, lowering bandwidth costs, and optimizing the way in which upstream links are used. A number of products provide these route control capabilities to large enterprise customers which have their own public AS number and advertise their IP address prefixes to upstream ISPs using BGP recognizing that not all enterprises are large enough to warrant BGP peering with ISPs, another class of products extends these advantages to smaller multihomed organizations which do not use BGP. These products use a variety of mechanisms and policies for route control but aside from marketing statements, little is known about their quantitative benefits. 2.1 Proposed System We study mechanisms for improving Internet performance of enterprise networks via route control. Several research studies and products have considered other benefits of multihoming route control. In a study closely related to ours, the authors conduct trace-driven experiments to evaluate several design options using a commercial multihoming device. The evaluation focuses on the ability of several algorithms to balance load over multiple broadband-class links to provide service similar to a single higher-bandwidth link. The effectiveness of hash-based link selection (i.e., hashing on packet header fields) in balancing load is comparable to load-based selection[5]. similarly consider various mechanisms for improving the reliability of Web access for DSL clients in. A PRACTICAL ROUTE CONTROL 1) Isp Multihoming Buy and use connections from multiple Internet Service Providers (ISPs).The Primary goal is high reliability or availability and Use connections in primary-backup mode.increasingly used for other goals as Optimizing cost, performance, load balancing. 3.1 Multihoming Issues Load sharing : How to distribute the traffic over multiple links? Reliability : If load sharing leads to preferencing links for certain subnets, is reliability reduced? 88 Page

3 Fig 1: Operations of Route Control Components Address/Aggregation :which subnet addresses should the multihomed customer use and how will this affect its provider s ability to aggregate routes? 3.2 Route Control Components By definition, must ensure all transfers traverse good ISP links. operations of route control components are shown in fig1.three key components are 1.Monitoring ISP links 2.Selecting good ISPs 3.Directing traffic over selected ISPs 3.3 Dataflow Diagram IV. Modules 4.0 Sending the data The first issue is sending data the right ISP link to direct each transfer is shown in fig 2. This choice depends on the time-varying performance of each ISP link to each destination being accessed. However, network performance could fluctuate, very substantially on some occasions.a multihomed enterprise, therefore, needs effective mechanisms to monitor the performance for most, if not all, destinations over each of its ISP links. There are two further issues in monitoring performance over ISP links: what to monitor and how. In the enterprise case, one would ideally like to monitor the performance from every possible content provider over each ISP link. However, this may be infeasible in the case of a large enterprise which accesses content from many different sources. Fig 2: Module 1 89 Page

4 4.1 Validation of ISP As per fig.3 Data in the middleware are validated before they are transferred to the clients. Validation is carried out by using the empty packets. Empty packets are used to calculate the minimum time. This choice must be made on a per-destination basis at fine time-scales. An important issue is whether historical data about ISP performance to a given destination should be employed. In general, the performance of an ISP to a destination can be tracked using a smoothed, time-weighted estimate of the performance. A simpler, more scalable solution tothis problem is to monitor only the most important or popular destinations. 4.2 Selection of best ISP The best ISP is selected by viewing the minimum packet time using passive measurement algorithm which is shown in fig 4. Passive measurement mechanisms rely on observing the performance of ongoing transfers (i.e., in-band) to destinations, and using these observations as samples for estimating performance over the given ISP. Hence the packet About Data Measuring Data Protocol type Passive measurement Algorithm Select best ISP Based on RTT 4.3 Receiving the Data After the selection of best ISP Data are allowed to pass through that ISP. Data are transmitted by base on active measurement algorithm and it received by the server. In active monitoring, the multihomed enterprise performs out-of-band measurements to or from specific destinations. These measurements. In fig 5 we outline simple techniques to achieve fine-grained control over active or passive probes. Another important factor in monitoring performance is the time interval of monitoring. A long interval between samples implies using stale information to estimate ISP performance. This might result in a suboptimal choice of the ISP link for a particular destination. Source address View Receive Save the Data in the data File data particular from best ISP path Fig 3: Module-2 which consists of minimal time is selected. Network performance could fluctuate, very substantially on some occasions[6].the next step is to direct the traffic from the destination over the chosen link. Controlling the outbound direction of traffic is easy and well-studied. Our focus, rather, is on the inbound route control mechanism. Inbound control refers to selecting the right ISP or incoming interface on which to receive data. For an enterprise network, the primary mechanisms available are route advertisements and use of different addresses for different connections. 90 Page

5 Fig.3 Module-3 Fig 5: Module-4 V. Implementation Details 5.0 Active Measurements Require injecting test packets into the network to determine network topology or end-to-end performance of network paths. Better characterize end-user perceived application-quality since they emulate experience of actual end-application traffic using a few test packets. We are using two mechanisms as Frequency Count We track the number of client requests directed to each destination. Every second, we initiate active probes to destinations with at least a threshold number of requests. Frequency Counts in its simplest form cannot easily track small, short-term shifts in the popularity of the destinations[7]. These new, temporarilypopular destinations may not receive enough requests to exceed the threshold and force performance sampling for them, even though they are popular for a short time. Sliding Window is better at tracking temporal shifts in popularity. 5.1 Passive Measurement The passive measurement module tracks the performance to destinations of interest by sampling ISP links using Web requests initiated by clients in the enterprise. This module uses new requests to sample an ISP s performance to a destination if the performance estimate for that ISP is older than the predefined sampling interval[8]. If the module has current performance estimates for all links, then the connection is directed over the best link for the destination. The module maintains a performance hash table keyed by the Destination. A hash table entry holds the current estimates of the performance to the destination via the three ISPs, along with an associated timestamp indicating the last time performance to the destination via the ISP was measured.once a destination is selected for active probing, the active measurement scheme sends three probes, with different source IP addresses, corresponding to the three ISPs, and waits for the destination to respond. 5.2 Internet Service Provider (ISPs) This scheme maintains a window of size that contains the most recently accessed destinations. The window is implemented as a fixed size FIFO queue, in which destinations from newly initiated connections are inserted. If this causes the number of elements to exceed, then the oldest in the window is removed. Every seconds (the sampling interval), an active measurement thread scans the window and chooses percentage of the elements at random. After discarding duplicate destinations from this subset, the active-measurement scheme measures the performance to the remaining destinations along the ISPs. The two active schemes offer distinct trade-offs. Notice that both the schemes effectively sample the performance to destinations that are accessed 91 Page

6 more often relative to others. However, there are a few key differences. First, Frequency Counts is deterministic since it works with a reasonably precise set of popular destinations. 5.3 Choosing The Best Isp Per Transfer Track the average performance of each ISP, per destination and its Smoothed averaging function such as EWMA EWMA ti (P,D)=(1-e -(t i -t i-1 )/a )s ti +e -(t i -t i-1 )/a EWMA ti-1 (P,D) a > 0 some weight attached to historical samples. 5.4 Multihoming Improvements To understand benefits of multihoming, we adopt the following simple methodology: For each download, we compare the client perceived turnaround time achieved by using the best ISP among all those available in the city, with that from using the best ISP in a candidate multihoming option. We average this ratio over transfers to all clients, and report the minimum normalized performance metric[9].we compare only those transactions for which there was a successful transfer over all ISPs at roughly the same time. Let M best (A i, t) denote the best turnaround time for a transfer to A i (i=1,,68) at time t,across all ISPs in a network.for a k- multihoming option OP k, let M op (A i, t) be the best turnaround time across ISPs in the set OP k. Then, the RTT performance benefits from the option OP k is RTT OP = i,t (M OP (A i, t)/m best (A i, t)) Numvalid(t ) The sum is over all t when transfer occur from all ISP in th network to A i. Numvalid(t) is the number of such instances. We compute throughput benefits as Thru OP = i,t (M best (A i, t)/m OP (A i, t)) Numvalid(t ) 5.5 Load Sharing From Isp To Customer Using AttributesThe provider splits traffic across 2 links according to prefix. Here we tried to implement this strategy using attributes. In which customer sets MEDs and the provider sets LOCAL_PREF. Fig 6: Load Sharing from ISP to Customer 5.6 Load Sharing From Customer To Isp Using Policy This can be done by sending traffic to ISP s customers on one link and to the rest of the Internet on 2nd link[10]. But this will be implemented only by using policy to control announcements. 92 Page

7 Fig 7: Load Sharing from customer to ISP 5.7 Round-Trip Time Performance All-pairs HTTP transfers every 6min it record HTTP-level RTT. We compute delays of best direct and overlay paths. Generally overlay paths could have many hops. So overlay paths superset of multihoming paths Number of 6 Providers 5 4 Normalized 3 Performance Fig 8:Turn around time 5.8 Throughput Performance All-pairs transfers at a rate of 1MB/18Min. Based on this we record throughput and compare best overlay and direct throughputs. Combine per-hop throughputs (like Detour does) There function is based on a combination of Pessimistic and optimistic functions[11]. We have to consider one-hop overlay. VI. Security An AS is highly vulnerable to false information in BGP updates. Hence, an ISP may wish to exercise defensive programming to protect itself against attacks. Several mechanisms are implemented for security. Of these some mechanisms are discussed. 6.0 Discarding Invalid Routes(By Import Filtering) Purpose: ISPs wish protect their customers from learning invalid routes. Mechanism: checks to ensure update contents are valid before propagating them internally; ISPs can also perform certain sanity checks on the AS path. 6.1 Protect Integrity Of Routing Polices (By Rewriting Attributes) Purpose: An ISP may want to prevent a neighbouring AS from having undue influence over its routing decisions, in violation of their peering agreement. Mechanism: ISP can configure the import policy to delete attributes or overwrite them with the expected values. 93 Page

8 6.2 Securing The Network Infrastructure(By Export Filtering) Purpose: An ISP may wish to prevent external entities from accessing certain internal resources. Mechanism: configuring its export policies that filter BGP advertisements. Eg: filtering the IP addresses used to number the router interfaces. 6.3 Blocking Denial-Of-Service Attacks (By Filtering And Damping) Problem background: Denial-of-service attacks can degrade service by overloading the routers with extra BGP update messages or consuming excessive amounts of link bandwidth. Mechanism: ISP can configure each BGP session with a maximum acceptable number of prefixes, tearing down the session when the limit is exceeded. VII. Future Enhancement In future we can enhance the project with more techniques as per discussed in our base paper. We can also employ this method through wireless sensor network. VIII. Conclusion Finally, to quantify the performance improvements from route control and evaluate practical mechanisms and policies we implemented some best of methods in practice. The most current sample of the performance to a destination via a given ISP is a reasonably good estimator of the near-term performance to the destination. We show that the overhead of collecting and managing performance information for various destinations is negligible. The RTT and throughput improvement results good when comparing to the existing system. This paper will describe our enterprise multihoming solution and the various strategies for estimating ISP performance and for route control. The experimental set-up and results from our evaluation of the solution. Since our test bed nodes are part of a production infrastructure, we limit the frequencies of all-pairs measurements. To ensure that all active probes between pairs of nodes observe similar network conditions, we scheduled them to occur within 30s of each other for the RTT data set, and within a 2 mins of each other for the throughput data set. We show that both passive and active measurement-based techniques are equally effective and could improve the Web response times of enterprise networks by up to 25% on average, compared to using a single ISP. We also showed that the performance penalty from collecting and managing performance data across various destinations is negligible. References [1] A. Akella, J. Pang, B. Maggs, S. Seshan, and A.Shaikh, A comparison of overlay routing and multihomingroute control, in Proc. ACM SIGCOMM, Portland, pp ,2004. [2] J.W. Stewart, BGP4: Inter-Domain Routing in the Internet in proc.ieee INFOCOM,pp24-31,1999. [4] S. Agarwal, J. Rexford, and R. H. Katz, Route Science Technologies and PathControl, in proc.ieee conference, pp ,2003. [5] M.Fang,N.Shivakumar,H.Garcia, R.Motwani Internap Network Services and Flow Control Platform, pp ,2002. [6] C. Estan and G. Varghese, New directions in Traffic measurement and accounting, in Proc. ACM SIGCOMM, Pittsburgh,pp , [7] E. M. Nahum, M. Rosu, S. Seshan, and Almeida, The effects of wide-area conditions on server performance, in Proc. ACM SIGMETRICS, Cambridge,pp , [8] F. Guo, J. Chen, W. Li, and T. Chiueh, Experiences in building a multihoming load balancing system, in Proc. IEEE INFOCOM, Hong Kong, pp , [9] Y. Zhang, N. Duffield, V. Paxson, and S.Shenker, On the constancy of internet path properties, in Proc. ACM SIGCOMM Internet Measurement Workshop (IMW),pp , [10] P.Morissey, Route optimizers:mapping out the Best route,in proc.ieee Network computing conference,pp 1-13,2003. [11] D.Goldenberg,L.Qiu,H.Xie,Y.Yang, Optimizing cost and performance for Multihoming, in proc.acm SIGCOMM, pp 65-72,2004. [12] D.Andersen,H.Balakrishnan,M.Kashoek,R.Roa, Improving web availability for clients with MONET,in proc. 2 nd Networked systems design and implementation conference,pp , Page

Multihoming Performance Benefits: An Experimental Evaluation of Practical Enterprise Strategies

Multihoming Performance Benefits: An Experimental Evaluation of Practical Enterprise Strategies Multihoming Performance Benefits: An Experimental Evaluation of Practical Enterprise Strategies Aditya Akella, Srinivasan Seshan Anees Shaikh Dept of Computer Science Network Software and Services Carnegie

More information

Network Level Multihoming and BGP Challenges

Network Level Multihoming and BGP Challenges Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology jili@cc.hut.fi Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.

More information

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007 Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?

More information

A Link Load Balancing Solution for Multi-Homed Networks

A Link Load Balancing Solution for Multi-Homed Networks A Link Load Balancing Solution for Multi-Homed Networks Overview An increasing number of enterprises are using the Internet for delivering mission-critical content and applications. By maintaining only

More information

A Multihoming solution for medium sized enterprises

A Multihoming solution for medium sized enterprises A Multihoming solution for medium sized enterprises Praveen R Prashant J Hemant RG International Institute of Information Technology, Hyderabad {praveen_r, prashant_j}@students.iiit.net, hemant@iiit.net

More information

EE627 Lecture 22. Multihoming Route Control Devices

EE627 Lecture 22. Multihoming Route Control Devices EE627 Lecture 22 Multihoming Route Control Devices 1 Multihoming Connect to multiple ISPs Provide reliability from access link/isp failures Potential for load balancing Intelligent Route Control Devices

More information

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. prashil.waghmare14@gmail.com

More information

THE INTERNATIONAL JOURNAL OF SCIENCE & TECHNOLEDGE

THE INTERNATIONAL JOURNAL OF SCIENCE & TECHNOLEDGE THE INTERNATIONAL JOURNAL OF SCIENCE & TECHNOLEDGE Remote Path Identification using Packet Pair Technique to Strengthen the Security for Online Applications R. Abinaya PG Scholar, Department of CSE, M.A.M

More information

Improving Reliability for Multi-Home Inbound Traffic: MHLB/I Packet-Level Inter-Domain Load-Balancing

Improving Reliability for Multi-Home Inbound Traffic: MHLB/I Packet-Level Inter-Domain Load-Balancing Improving Reliability for Multi-Home Inbound Traffic: MHLB/I Packet-Level Inter-Domain Load-Balancing Hiroshi Fujinoki Department of Computer Science Southern Illinois University Edwardsville Edwardsville,

More information

AN EFFICIENT DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS

AN EFFICIENT DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

A Topology-Aware Relay Lookup Scheme for P2P VoIP System

A Topology-Aware Relay Lookup Scheme for P2P VoIP System Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme

More information

A Passive Method for Estimating End-to-End TCP Packet Loss

A Passive Method for Estimating End-to-End TCP Packet Loss A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se

More information

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There

More information

How To Make A Network Plan Based On Bg, Qos, And Autonomous System (As)

How To Make A Network Plan Based On Bg, Qos, And Autonomous System (As) Policy Based QoS support using BGP Routing Priyadarsi Nanda and Andrew James Simmonds Department of Computer Systems Faculty of Information Technology University of Technology, Sydney Broadway, NSW Australia

More information

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP) TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page

More information

A Comparison of Overlay Routing and Multihoming Route Control

A Comparison of Overlay Routing and Multihoming Route Control A Comparison of Overlay Routing and Multihoming Route Control Aditya Akella Jeffrey Pang Bruce Maggs Srinivasan Seshan Carnegie Mellon University {aditya, jeffpang,srini+, bmm}@cs.cmu.edu Anees Shaikh

More information

Two Approaches to Internet Traffic Engineering for End-to-End Quality of Service Provisioning

Two Approaches to Internet Traffic Engineering for End-to-End Quality of Service Provisioning Two Approaches to Internet Engineering for End-to-End Quality of Service Provisioning Kin-Hon Ho, Michael Howarth, Ning Wang, George Pavlou and Stylianos Georgoulas Centre for Communication Systems Research,

More information

Inbound Traffic Load Balancing in BGP Multi-homed Stub Networks

Inbound Traffic Load Balancing in BGP Multi-homed Stub Networks The 28th International Conference on Distributed Computing Systems Inbound Traffic Load Balancing in BGP Multi-homed Stub Networks Xiaomei Liu and Li Xiao Department of Computer Science and Engineering

More information

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather

More information

Efficient Detection of Ddos Attacks by Entropy Variation

Efficient Detection of Ddos Attacks by Entropy Variation IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 7, Issue 1 (Nov-Dec. 2012), PP 13-18 Efficient Detection of Ddos Attacks by Entropy Variation 1 V.Sus hma R eddy,

More information

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more

More information

Comparative Analysis of Congestion Control Algorithms Using ns-2

Comparative Analysis of Congestion Control Algorithms Using ns-2 www.ijcsi.org 89 Comparative Analysis of Congestion Control Algorithms Using ns-2 Sanjeev Patel 1, P. K. Gupta 2, Arjun Garg 3, Prateek Mehrotra 4 and Manish Chhabra 5 1 Deptt. of Computer Sc. & Engg,

More information

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3. Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System

More information

Detection of Distributed Denial of Service Attack with Hadoop on Live Network

Detection of Distributed Denial of Service Attack with Hadoop on Live Network Detection of Distributed Denial of Service Attack with Hadoop on Live Network Suchita Korad 1, Shubhada Kadam 2, Prajakta Deore 3, Madhuri Jadhav 4, Prof.Rahul Patil 5 Students, Dept. of Computer, PCCOE,

More information

Can Forwarding Loops Appear when Activating ibgp Multipath Load Sharing?

Can Forwarding Loops Appear when Activating ibgp Multipath Load Sharing? Can Forwarding Loops Appear when Activating ibgp Multipath Load Sharing? Simon Balon and Guy Leduc Research Unit in Networking EECS Department- University of Liège (ULg) Institut Montefiore, B28 - B-4000

More information

B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure

B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure Interdomain traffic engineering with BGP B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure Abstract Traffic engineering is performed by means of a set of techniques that can be used to better

More information

Multimedia Requirements. Multimedia and Networks. Quality of Service

Multimedia Requirements. Multimedia and Networks. Quality of Service Multimedia Requirements Chapter 2: Representation of Multimedia Data Chapter 3: Multimedia Systems Communication Aspects and Services Multimedia Applications and Transfer/Control Protocols Quality of Service

More information

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic

More information

Inter-domain Routing

Inter-domain Routing Inter-domain Routing The structure of Internet Qinsi Wang Computer Science Department, Carnegie Mellon September 15, 2010 Outline Lecture 4: Interdomain Routing; L. Gao, On inferring autonomous system

More information

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.

More information

Internet Infrastructure Measurement: Challenges and Tools

Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with

More information

B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure

B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure Interdomain traffic engineering with BGP B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure Abstract Traffic engineering is performed by means of a set of techniques that can be used to better

More information

An Efficient Load Balancing Technology in CDN

An Efficient Load Balancing Technology in CDN Issue 2, Volume 1, 2007 92 An Efficient Load Balancing Technology in CDN YUN BAI 1, BO JIA 2, JIXIANG ZHANG 3, QIANGGUO PU 1, NIKOS MASTORAKIS 4 1 College of Information and Electronic Engineering, University

More information

Border Gateway Protocol BGP4 (2)

Border Gateway Protocol BGP4 (2) Border Gateway Protocol BGP4 (2) Professor Richard Harris School of Engineering and Advanced Technology (SEAT) Presentation Outline Border Gateway Protocol - Continued Computer Networks - 1/2 Learning

More information

Increasing Path Diversity using Route Reflector

Increasing Path Diversity using Route Reflector International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 5 ǁ May. 2013 ǁ PP.05-09 Increasing Path Diversity using Route Reflector Prasha Dubey

More information

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

Opnet Based simulation for route redistribution in EIGRP, BGP and OSPF network protocols

Opnet Based simulation for route redistribution in EIGRP, BGP and OSPF network protocols IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 1, Ver. IV (Jan. 2014), PP 47-52 Opnet Based simulation for route redistribution

More information

Validating the System Behavior of Large-Scale Networked Computers

Validating the System Behavior of Large-Scale Networked Computers Validating the System Behavior of Large-Scale Networked Computers Chen-Nee Chuah Robust & Ubiquitous Networking (RUBINET) Lab http://www.ece.ucdavis.edu/rubinet Electrical & Computer Engineering University

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Load Distribution in Large Scale Network Monitoring Infrastructures

Load Distribution in Large Scale Network Monitoring Infrastructures Load Distribution in Large Scale Network Monitoring Infrastructures Josep Sanjuàs-Cuxart, Pere Barlet-Ros, Gianluca Iannaccone, and Josep Solé-Pareta Universitat Politècnica de Catalunya (UPC) {jsanjuas,pbarlet,pareta}@ac.upc.edu

More information

A Study of Network Security Systems

A Study of Network Security Systems A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya

More information

Building a Secure and Reliable Network via Multi-homed VPN

Building a Secure and Reliable Network via Multi-homed VPN Abstract Session IT 303-088 Building a Secure and Reliable Network via Multi-homed VPN Baijian Yang Department of Technology Ball State University byang@bsu.edu Tianguang Gao Department of Educational

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India maharudra90@gmail.com,

More information

A Novel Packet Marketing Method in DDoS Attack Detection

A Novel Packet Marketing Method in DDoS Attack Detection SCI-PUBLICATIONS Author Manuscript American Journal of Applied Sciences 4 (10): 741-745, 2007 ISSN 1546-9239 2007 Science Publications A Novel Packet Marketing Method in DDoS Attack Detection 1 Changhyun

More information

Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats

Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats Outline EE 22: Interdomain Routing Protocol (BGP) Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee22/fa9 (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues

More information

Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to:

Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to: Border Gateway Protocol Exterior routing protocols created to: control the expansion of routing tables provide a structured view of the Internet by segregating routing domains into separate administrations

More information

TRUFFLE Broadband Bonding Network Appliance. A Frequently Asked Question on. Link Bonding vs. Load Balancing

TRUFFLE Broadband Bonding Network Appliance. A Frequently Asked Question on. Link Bonding vs. Load Balancing TRUFFLE Broadband Bonding Network Appliance A Frequently Asked Question on Link Bonding vs. Load Balancing 5703 Oberlin Dr Suite 208 San Diego, CA 92121 P:888.842.1231 F: 858.452.1035 info@mushroomnetworks.com

More information

Detection and Controlling of DDoS Attacks by a Collaborative Protection Network

Detection and Controlling of DDoS Attacks by a Collaborative Protection Network Detection and Controlling of DDoS Attacks by a Collaborative Protection Network Anu Johnson 1, Bhuvaneswari.P 2 PG Scholar, Dept. of C.S.E, Anna University, Hindusthan Institute of Technology, Coimbatore,

More information

Low-rate TCP-targeted Denial of Service Attack Defense

Low-rate TCP-targeted Denial of Service Attack Defense Low-rate TCP-targeted Denial of Service Attack Defense Johnny Tsao Petros Efstathopoulos University of California, Los Angeles, Computer Science Department Los Angeles, CA E-mail: {johnny5t, pefstath}@cs.ucla.edu

More information

ECSE-6600: Internet Protocols Exam 2

ECSE-6600: Internet Protocols Exam 2 ECSE-6600: Internet Protocols Exam 2 Time: 75 min (strictly enforced) Points: 50 YOUR NAME: Be brief, but DO NOT omit necessary detail {Note: Simply copying text directly from the slides or notes will

More information

LIST OF FIGURES. Figure No. Caption Page No.

LIST OF FIGURES. Figure No. Caption Page No. LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS

More information

Bandwidth Aggregation, Teaming and Bonding

Bandwidth Aggregation, Teaming and Bonding Bandwidth Aggregation, Teaming and Bonding The increased use of Internet sharing combined with graphically rich web sites and multimedia applications have created a virtually insatiable demand for Internet

More information

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,

More information

PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services

PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services Ming Zhang, Chi Zhang Vivek Pai, Larry Peterson, Randy Wang Princeton University Motivation Routing anomalies are

More information

TCP in Wireless Mobile Networks

TCP in Wireless Mobile Networks TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer

More information

Inbound Traffic Engineering for Multihomed ASes Using AS Path Prepending

Inbound Traffic Engineering for Multihomed ASes Using AS Path Prepending Inbound Traffic Engineering for Multihomed ASes Using AS Path Prepending Rocky K. C. Chang Department of Computing The Hong Kong Polytechnic University Hung Hom, Kowloon Hong Kong csrchang@comp.polyu.edu.hk

More information

BGP FORGOTTEN BUT USEFUL FEATURES. Piotr Wojciechowski (CCIE #25543)

BGP FORGOTTEN BUT USEFUL FEATURES. Piotr Wojciechowski (CCIE #25543) BGP FORGOTTEN BUT USEFUL FEATURES Piotr Wojciechowski (CCIE #25543) ABOUT ME Senior Network Engineer MSO at VeriFone Inc. Previously Network Solutions Architect at one of top polish IT integrators CCIE

More information

Traceroute-Based Topology Inference without Network Coordinate Estimation

Traceroute-Based Topology Inference without Network Coordinate Estimation Traceroute-Based Topology Inference without Network Coordinate Estimation Xing Jin, Wanqing Tu Department of Computer Science and Engineering The Hong Kong University of Science and Technology Clear Water

More information

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.

More information

First Midterm for ECE374 03/24/11 Solution!!

First Midterm for ECE374 03/24/11 Solution!! 1 First Midterm for ECE374 03/24/11 Solution!! Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit if you show your

More information

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,

More information

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment R&D supporting future cloud computing infrastructure technologies Research and Development on Autonomic Operation Control Infrastructure Technologies in the Cloud Computing Environment DEMPO Hiroshi, KAMI

More information

A Network Monitoring System with a Peer-to-Peer Architecture

A Network Monitoring System with a Peer-to-Peer Architecture A Network Monitoring System with a Peer-to-Peer Architecture Paulo Salvador, Rui Valadas University of Aveiro / Institute of Telecommunications Aveiro E-mail: salvador@av.it.pt; rv@det.ua.pt Abstract The

More information

IK2205 Inter-domain Routing

IK2205 Inter-domain Routing IK2205 Inter-domain Routing Lecture 5 Voravit Tanyingyong, voravit@kth.se Outline Redundancy, Symmetry, and Load Balancing Redundancy Symmetry Load balancing Scenarios Controlling Routing Inside the AS

More information

BGP Attributes and Path Selection

BGP Attributes and Path Selection BGP Attributes and Path Selection ISP Workshops Last updated 29 th March 2015 1 BGP Attributes BGP s policy tool kit 2 What Is an Attribute?... Next Hop AS Path MED...... p Part of a BGP Update p Describes

More information

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup. CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer

More information

On the Impact of Route Monitor Selection

On the Impact of Route Monitor Selection On the Impact of Route Monitor Selection Ying Zhang Zheng Zhang Z. Morley Mao Y. Charlie Hu Bruce Maggs Univ. of Michigan Purdue Univ. Univ. of Michigan Purdue Univ. CMU Paper ID: E-578473438 Number of

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

Quality of Service Routing Network and Performance Evaluation*

Quality of Service Routing Network and Performance Evaluation* Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,

More information

A Scalable Monitoring Approach Based on Aggregation and Refinement

A Scalable Monitoring Approach Based on Aggregation and Refinement IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL 20, NO 4, MAY 2002 677 A Scalable Monitoring Approach Based on Aggregation and Refinement Yow-Jian Lin, Member, IEEE and Mun Choon Chan, Member, IEEE

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Detecting Anomalies Using End-to-End Path Measurements

Detecting Anomalies Using End-to-End Path Measurements Detecting Anomalies Using End-to-End Path Measurements K. V. M. Naidu Debmalya Panigrahi Rajeev Rastogi Bell Labs Research India, Bangalore MIT Bell Labs Research India, Bangalore Abstract In this paper,

More information

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more

More information

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps

More information

An AS-Level Study of Internet Path Delay Characteristics

An AS-Level Study of Internet Path Delay Characteristics An AS-Level Study of Internet Path Delay Characteristics Amgad Zeitoun Chen-Nee Chuah Supratik Bhattacharyya Christophe Diot University of Michigan, Ann Arbor University of California Davis Sprint ATL

More information

Route Control Optimize Multi-homed Connections for Performance, Load and Cost By John Bartlett January 2002

Route Control Optimize Multi-homed Connections for Performance, Load and Cost By John Bartlett January 2002 Route Control Optimize Multi-homed Connections for Performance, Load and Cost By John Bartlett January 2002 The Internet is coming of age, in large part because of its ability to open up markets and to

More information

Research on Errors of Utilized Bandwidth Measured by NetFlow

Research on Errors of Utilized Bandwidth Measured by NetFlow Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic

More information

DESTINATION BASED RTBH FILTERING AT ATTACK ORIGINATING INTERNET SERVICE PROVIDER

DESTINATION BASED RTBH FILTERING AT ATTACK ORIGINATING INTERNET SERVICE PROVIDER DESTINATION BASED RTBH FILTERING AT ATTACK ORIGINATING INTERNET SERVICE PROVIDER Sarita Sharma 1, Davender Saini 2 1 Student M. Tech. ECE (2013-2015) Gurgaon Institute of Technology Management (M.D.U)

More information

Application of Netflow logs in Analysis and Detection of DDoS Attacks

Application of Netflow logs in Analysis and Detection of DDoS Attacks International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in

More information

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

A Novel Approach for Load Balancing In Heterogeneous Cellular Network

A Novel Approach for Load Balancing In Heterogeneous Cellular Network A Novel Approach for Load Balancing In Heterogeneous Cellular Network Bittu Ann Mathew1, Sumy Joseph2 PG Scholar, Dept of Computer Science, Amal Jyothi College of Engineering, Kanjirappally, Kerala, India1

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

How To Find A Failure In A Network

How To Find A Failure In A Network Practical Issues with Using Network Tomography for Fault Diagnosis Yiyi Huang Georgia Institute of Technology yiyih@cc.gatech.edu Nick Feamster Georgia Institute of Technology feamster@cc.gatech.edu Renata

More information

Internet inter-as routing: BGP

Internet inter-as routing: BGP Internet inter-as routing: BGP BGP (Border Gateway Protocol): the de facto standard BGP provides each AS a means to: 1. Obtain subnet reachability information from neighboring ASs. 2. Propagate the reachability

More information

APNIC elearning: BGP Attributes

APNIC elearning: BGP Attributes APNIC elearning: BGP Attributes Contact: training@apnic.net erou04_v1.0 Overview BGP Attributes Well-known and Optional Attributes AS Path AS Loop Detection ibgp and ebgp Next Hop Next Hop Best Practice

More information

Correlations in End-to-End Network Metrics: Impact on Large Scale Network Monitoring

Correlations in End-to-End Network Metrics: Impact on Large Scale Network Monitoring Correlations in End-to-End Network Metrics: Impact on Large Scale Network Monitoring Praveen Yalagandula, Sung-Ju Lee, Puneet Sharma and Sujata Banerjee Hewlett-Packard Labs, Palo Alto, CA Abstract With

More information

Interdomain Routing. Project Report

Interdomain Routing. Project Report Interdomain Routing Project Report Network Infrastructure improvement proposal To Company A Team 4: Zhang Li Bin Yang Md. Safiqul Islam Saurabh Arora Network Infrastructure Improvement Interdomain routing

More information

Load Balancing Mechanisms in Data Center Networks

Load Balancing Mechanisms in Data Center Networks Load Balancing Mechanisms in Data Center Networks Santosh Mahapatra Xin Yuan Department of Computer Science, Florida State University, Tallahassee, FL 33 {mahapatr,xyuan}@cs.fsu.edu Abstract We consider

More information

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS

AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS Srikanth Tiyyagura Department of Computer Science and Engineering JNTUA College of Engg., pulivendula, Andhra Pradesh, India.

More information

Packet-Marking Scheme for DDoS Attack Prevention

Packet-Marking Scheme for DDoS Attack Prevention Abstract Packet-Marking Scheme for DDoS Attack Prevention K. Stefanidis and D. N. Serpanos {stefanid, serpanos}@ee.upatras.gr Electrical and Computer Engineering Department University of Patras Patras,

More information

Module 7. Routing and Congestion Control. Version 2 CSE IIT, Kharagpur

Module 7. Routing and Congestion Control. Version 2 CSE IIT, Kharagpur Module 7 Routing and Congestion Control Lesson 4 Border Gateway Protocol (BGP) Specific Instructional Objectives On completion of this lesson, the students will be able to: Explain the operation of the

More information

Outline. TCP connection setup/data transfer. 15-441 Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics

Outline. TCP connection setup/data transfer. 15-441 Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics Outline 15-441 Computer Networking Lecture 8 TCP & Congestion Control TCP connection setup/data transfer TCP Reliability Congestion sources and collapse Congestion control basics Lecture 8: 09-23-2002

More information

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

CS 457 Lecture 19 Global Internet - BGP. Fall 2011 CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with

More information

Dynamics of Prefix Usage at an Edge Router

Dynamics of Prefix Usage at an Edge Router Dynamics of Prefix Usage at an Edge Router Kaustubh Gadkari, Daniel Massey, and Christos Papadopoulos Computer Science Department, Colorado State University, USA {kaustubh, massey, christos@cs.colostate.edu}

More information

Evaluating Cooperative Web Caching Protocols for Emerging Network Technologies 1

Evaluating Cooperative Web Caching Protocols for Emerging Network Technologies 1 Evaluating Cooperative Web Caching Protocols for Emerging Network Technologies 1 Christoph Lindemann and Oliver P. Waldhorst University of Dortmund Department of Computer Science August-Schmidt-Str. 12

More information